SlideShare a Scribd company logo
2
Most read
4
Most read
An Introduction to Information
Security – What?
 http://www.shaolintiger.com
 http://www.darknet.org.uk
 @ShaolinTiger & @THEdarknet on Twitter
So who am I? Founder & Writer
- Top 5 infosec blog in the world
- 40,000+ RSS Subscribers
- 11,000+ Twitter followers
- http://www.darknet.org.uk
Co-Founded Security-Forums.com
- Top 3 infosec forum in the World
- Founded in 2002 to get out of Usenet
- Sold in 2004 to windowsecurity.com
What is Information Security?
- It is quite a vague term – but it can be defined.
C
AI
CIA?
Confidentiality
Integrity
Availability
Confidentiality
- If confidentiality is breached it’s generally
classified as a ‘leak’
- Can have legal implications
- Bad for your reputation
- Hacker only needs read access
Integrity
- Less common but more serious
- Can cause persistent problems
- Possible to remain undetected for a long period
- Hacker does need write access
Availability
- This is what DDoS attacks do
- Usually short term but VERY damaging
- Hard to solve
- Hacker needs no access
What can I do?
- Passwords, passwords passwords!
- This is THE most important thing
Use a password manager
 This will help you to:
 Generate, maintain & manage strong passwords
 Use different passwords for every site/service
 Manage password access for your company
 Change passwords when employees leave
 Use KeepassX, LastPass, 1Password or Passpack
Resource Management
- People can be bad, make sure all master
accounts are under the company not under
individuals
- Separate access so changes can be logged
- This is especially critical for tech services such
as:
- Github
- Amazon Web Services
- Linode
- Bitbucket
- Dropbox
- Anywhere that your code/resources are stored
Turn on MAX Security
- Pretty much all services like AWS/Github etc
support 2FA (Two factor authentication)
PLEASE TURN IT ON!
If not you could end up like Code Spaces.
Education
- The weakest part of any organisation is always
the human element, known in infosec as
‘wetware’
- Prone to social engineering
- If you are a company owner or the tech go-to
person, it’s your job to educate
Safe Coding Practises
- Use a framework
- Don’t EVER EVER EVER EVER trust user input
- Always Hash passwords
- Build your APIs with Authentication
- Check ‘OWASP Top 10’ for more info
DDoS Protection
- Unfortunately if you get popular this is a serious
risk (Happening to Feedly/Evernote last month)
- There are various services that you can look at to
mitigate against DDoS attacks:
- http://www.incapsula.com/
- https://www.cloudflare.com/
- http://www.akamai.com/
Platform Security
- ALWAYS keep the core up to date
- If you can use a specialist host (WPengine/Page.ly)
- Use as few plugins as possible
- NEVER pirate themes/plugins as they often contain
malware
The END!
Questions?
Stalk me @ShaolinTiger or @THEdarknet on Twitter
If you are interested in Infosec – http://fb.me/darknetorguk
This preso will be on http://slideshare.net/shaolintiger

More Related Content

PDF
Introduction to Web Application Penetration Testing
PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
PDF
Cyber Security Awareness
PPTX
Guide to MFA
PPTX
Single sign on - SSO
PPT
Introduction to Web Application Penetration Testing
PPTX
Data protection and privacy
PPTX
Multifactor Authentication
Introduction to Web Application Penetration Testing
Identity and Access Management (IAM): Benefits and Best Practices 
Cyber Security Awareness
Guide to MFA
Single sign on - SSO
Introduction to Web Application Penetration Testing
Data protection and privacy
Multifactor Authentication

What's hot (20)

PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
Information privacy and Security
PPTX
Phising a Threat to Network Security
PDF
User Authentication: Passwords and Beyond
PPTX
Cybersecurity Awareness Session by Adam
PDF
What is two factor or multi-factor authentication
PPTX
Two factor authentication presentation mcit
PPTX
Cross Site Request Forgery (CSRF) Scripting Explained
PPTX
Phishing Attack Awareness and Prevention
PPTX
Phishing technology
PPTX
Password Attack
PPT
Phishing
PDF
Cybersecurity Employee Training
PPTX
Password Policy and Account Lockout Policies
PPTX
Phishing
PPTX
Email phishing and countermeasures
PPTX
Two Factor Authentication
PDF
DLP Data leak prevention
DOCX
AAA server
PDF
Password Management
OWASP Top 10 Web Application Vulnerabilities
Information privacy and Security
Phising a Threat to Network Security
User Authentication: Passwords and Beyond
Cybersecurity Awareness Session by Adam
What is two factor or multi-factor authentication
Two factor authentication presentation mcit
Cross Site Request Forgery (CSRF) Scripting Explained
Phishing Attack Awareness and Prevention
Phishing technology
Password Attack
Phishing
Cybersecurity Employee Training
Password Policy and Account Lockout Policies
Phishing
Email phishing and countermeasures
Two Factor Authentication
DLP Data leak prevention
AAA server
Password Management
Ad

Viewers also liked (20)

PPTX
INFORMATION SECURITY
PPT
Introduction To Information Security
PPT
Introduction to Information Security
PPTX
Information Security Lecture #1 ppt
PPT
Information security
PPTX
InformationSecurity
PPT
Information security management
PPTX
Information security management system
PPTX
Introduction to Information Security
PPT
Introduction to information security
PDF
Introduction to Information Security
PPTX
Building Scalable Web Apps - LVL.UP KL
PPT
High Performance Wordpress
PPT
The History Of The Future
PPT
High Availabiltity & Replica Sets with mongoDB
PPT
End User Security Awareness Presentation
PPT
Introduction To Information Systems Security 365 765
PPT
Sharing of Information
PDF
Business continuity planning and disaster recovery
PPTX
Build and Information Security Strategy
INFORMATION SECURITY
Introduction To Information Security
Introduction to Information Security
Information Security Lecture #1 ppt
Information security
InformationSecurity
Information security management
Information security management system
Introduction to Information Security
Introduction to information security
Introduction to Information Security
Building Scalable Web Apps - LVL.UP KL
High Performance Wordpress
The History Of The Future
High Availabiltity & Replica Sets with mongoDB
End User Security Awareness Presentation
Introduction To Information Systems Security 365 765
Sharing of Information
Business continuity planning and disaster recovery
Build and Information Security Strategy
Ad

Similar to Introduction to Information Security (20)

PPTX
Web Application Security - DevFest + GDay George Town 2016
PPTX
Information Security introduction and management.pptx
PPTX
Recommending information security measures
PDF
Introduction to information security
PPTX
17 info sec_ma_imt_27_2_2012
PPT
3 Most Common Threats Of Information Security
PPT
Intro to Information Security.ppt
PPT
Information security a new era technology_
PDF
Health Information Privacy and Security
PPTX
What is Information Security and why you should care ...
PDF
Customer information security awareness training
PDF
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
PDF
IMA Meeting 03222012
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PPTX
Web Application Security Session for Web Developers
PDF
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
DOCX
RaoNayakShelve inNetworkingSecurityUser levelB.docx
PPTX
IT security
PPT
Information security
PPT
IT-Security-20210426203847.ppt
Web Application Security - DevFest + GDay George Town 2016
Information Security introduction and management.pptx
Recommending information security measures
Introduction to information security
17 info sec_ma_imt_27_2_2012
3 Most Common Threats Of Information Security
Intro to Information Security.ppt
Information security a new era technology_
Health Information Privacy and Security
What is Information Security and why you should care ...
Customer information security awareness training
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
IMA Meeting 03222012
Lecture 6 Cybersecurity-Basics and .pptx
Web Application Security Session for Web Developers
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
RaoNayakShelve inNetworkingSecurityUser levelB.docx
IT security
Information security
IT-Security-20210426203847.ppt

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
Teaching material agriculture food technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Modernizing your data center with Dell and AMD
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
Teaching material agriculture food technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD

Introduction to Information Security

  • 1. An Introduction to Information Security – What?  http://www.shaolintiger.com  http://www.darknet.org.uk  @ShaolinTiger & @THEdarknet on Twitter
  • 2. So who am I? Founder & Writer - Top 5 infosec blog in the world - 40,000+ RSS Subscribers - 11,000+ Twitter followers - http://www.darknet.org.uk
  • 3. Co-Founded Security-Forums.com - Top 3 infosec forum in the World - Founded in 2002 to get out of Usenet - Sold in 2004 to windowsecurity.com
  • 4. What is Information Security? - It is quite a vague term – but it can be defined. C AI
  • 6. Confidentiality - If confidentiality is breached it’s generally classified as a ‘leak’ - Can have legal implications - Bad for your reputation - Hacker only needs read access
  • 7. Integrity - Less common but more serious - Can cause persistent problems - Possible to remain undetected for a long period - Hacker does need write access
  • 8. Availability - This is what DDoS attacks do - Usually short term but VERY damaging - Hard to solve - Hacker needs no access
  • 9. What can I do? - Passwords, passwords passwords! - This is THE most important thing
  • 10. Use a password manager  This will help you to:  Generate, maintain & manage strong passwords  Use different passwords for every site/service  Manage password access for your company  Change passwords when employees leave  Use KeepassX, LastPass, 1Password or Passpack
  • 11. Resource Management - People can be bad, make sure all master accounts are under the company not under individuals - Separate access so changes can be logged - This is especially critical for tech services such as: - Github - Amazon Web Services - Linode - Bitbucket - Dropbox - Anywhere that your code/resources are stored
  • 12. Turn on MAX Security - Pretty much all services like AWS/Github etc support 2FA (Two factor authentication) PLEASE TURN IT ON! If not you could end up like Code Spaces.
  • 13. Education - The weakest part of any organisation is always the human element, known in infosec as ‘wetware’ - Prone to social engineering - If you are a company owner or the tech go-to person, it’s your job to educate
  • 14. Safe Coding Practises - Use a framework - Don’t EVER EVER EVER EVER trust user input - Always Hash passwords - Build your APIs with Authentication - Check ‘OWASP Top 10’ for more info
  • 15. DDoS Protection - Unfortunately if you get popular this is a serious risk (Happening to Feedly/Evernote last month) - There are various services that you can look at to mitigate against DDoS attacks: - http://www.incapsula.com/ - https://www.cloudflare.com/ - http://www.akamai.com/
  • 16. Platform Security - ALWAYS keep the core up to date - If you can use a specialist host (WPengine/Page.ly) - Use as few plugins as possible - NEVER pirate themes/plugins as they often contain malware
  • 17. The END! Questions? Stalk me @ShaolinTiger or @THEdarknet on Twitter If you are interested in Infosec – http://fb.me/darknetorguk This preso will be on http://slideshare.net/shaolintiger